• Mapping Model Tracks How Hate Spreads and Adapts Online

    Online hate thrives globally through self-organized, scalable clusters that interconnect to form resilient networks spread across multiple social media platforms, countries and languages, according to new research. Researchers developed a mapping model to track how these online hate clusters thrive. The model outlines challenges to dismantling online hate groups worldwide.

  • Despite YouTube Policy Update, Anti-Semitic, White Supremacist Channels Remain

    For years, YouTube has officially prohibited content which promoted or condoned violence or incited hatred against individuals or groups based on core characteristics such as ethnicity, gender and sexual identity, and religion. In June 2019 it updated that policy with specific prohibitions against ideologies like white supremacy, which asserted the superiority of one group in order to justify discriminating against or persecuting other groups. An analysis by ADL’s Center on Extremism found that a significant number of channels on YouTube’s platform continue to disseminate anti-Semitic and white supremacist content despite the company’s June 2019 crackdown on hate speech.

  • Concerns Growing that China's Influence Operations Getting Bolder

    The U.S. intelligence community has warned that the battle for information dominance has been joined. Until now, much of the focus on been on Russia for its use of social media to meddle in a number of Western elections, including the 2016 U.S. presidential elections and, more recently, the 2018 congressional elections. But top U.S. intelligence officials have repeatedly warned Russia is not alone, and that other U.S adversaries would be using lessons from Moscow’s successes for their own purposes.

  • Russia’s and China’s Political Warfare Campaigns: How the West Can Prevail

    The United States and its allies are facing an unprecedented challenge: Russia and China, two authoritarian states possessing substantial human, economic, technological, and other resources; armed with conventional and nuclear forces which, in many respects, rival those held by the Western allies; and working actively to undermine the core interests of the West. Their operations are designed to subvert the cohesion of the Western allies and their partners; erode their economic, political, and social resilience; and undermine the West’s strategic positions in key regions. The Russian and Chinese regimes have made substantial progress towards these goals during the last two decades without conducting conventional military operations. Rather, Moscow and Beijing have employed sophisticated political warfare strategies and a wide range of mostly non-military instruments.

  • A How-To Guide for Identifying Terrorists by Their Behavior

    Terrorism is not owned by a particular organization or ideology. Rather, it’s a tactic deployed by anyone looking to use violence for some political or religious aim. And having not only government officials but everyday people understand that is key to catching additional would-be attackers before it’s too late.

  • The Fight in the Right: It Is Time to Tackle White Supremacist Terrorism Globally

    Robert Levinson, who served as the deputy director of U.S. Southern Command’s office in Washington, writes that after 9/11, it was made clear to the Southern Command that the fight against Al Qaeda would receive many more resources and much more attention that the effort to contain the FARC – the Marxist insurgency which had operated in Colombia since the early 1960s. The reason: The FARC was not considered a terrorist organization of “global reach.” You fight local terrorists by strengthening local governments and governance, while global terrorists involve much broader and more complicated efforts. Levinson writes: “By now it may be time to consider whether terrorism variously categorized as being inspired by white supremacy, white nationalism, Neo-Nazi, etc., and its various manifestations and adherents, has reached the threshold of “terrorists of global reach” who are now claiming victims in the United States homeland.”

  • U.S. to Allow Indefinite Detention of Migrant Children

    The administration said on Wednesday that it would remove limits on how long migrant children can be detained. The move would allow for migrant families detained at the Mexican border to be held until their asylum case is processed, which can take up to several months. In order to allow for indefinite detention, DHS said it would terminate the 1997 Flores Settlement Agreement, a legal ruling that barred the government from holding migrant children in detention for more than twenty days.

  • Facial Recognition: Ten Reasons You Should Be Worried About the Technology

    Facial recognition technology is spreading fast. Already widespread in China, software that identifies people by comparing images of their faces against a database of records is now being adopted across much of the rest of the world. It’s common among police forces but has also been used at airports, railway stations and shopping centers. The rapid growth of this technology has triggered a much-needed debate. Activists, politicians, academics and even police forces are expressing serious concerns over the impact facial recognition could have on a political culture based on rights and democracy.

  • Facial Recognition “Epidemic” in the U.K.

    An investigation by the London-based Big Brother Watch has uncovered what the organization describes as a facial recognition “epidemic” across privately owned sites in the United Kingdom. The civil liberties campaign group has found major property developers, shopping centers, museums, conference centers and casinos using the technology in the United Kingdom.

  • Proposed Bills Would Help Combat Domestic Terrorism

    “Left of boom” is a phrase frequently used by FBI agents to describe the FBI’s post-9/11 strategy to detect, disrupt and dismantle terrorist threats before acts of violence occur. Imagine a timeline where “boom” represents the moment the bomb goes off or an attack occurs: “Left of boom” means sometime before that moment. In the international terrorism arena, the U.S. has federal statutes that permit intervention left of boom, such as terrorism transcending national boundaries, providing material support to a foreign terrorist organization and attempt and conspiracy provisions for each. These statutes permit investigators to identify criminal behavior earlier in the timeline, and intercept subjects before their plans reach completion. No such laws exist for domestic terrorism.

  • Corporate Defenses Against Information Warfare

    When asked about Russian election interference during his congressional testimony last month, Robert Mueller said: “They’re doing it as we sit here.” To defend the nation against information warfare, the U.S. government has adopted a policy—by default, not by design—of relying on the private sector to police itself, with limited behind-the-scenes government assistance. Facebook’s website says: “Our detection technology helps us block millions of attempts to create fake accounts every day and detect millions more often within minutes after creation.” These numbers sound impressive, but they do not tell the whole story. To assess the effectiveness of company defenses, we must distinguish among three types of fake accounts: bots, fictitious user accounts, and impostor accounts. Russian agents have created and operated all three types of accounts.

     

  • Risks Grow as Countries Share Electricity Across Borders

    Increasing interconnection of electricity systems both within and between countries has much promise to help support clean energy power systems of the future. If the sun isn’t shining or wind isn’t blowing in one place, an electricity grid with high voltage transmission lines can move electricity to where it is needed. This shared infrastructure and increased trade can possibly serve as a basis for peace between neighbors in conflict, but it may also serve as a tool of coercion if the electricity can be cut off by one party.

  • Follow the Money: Thwarting Islamic State's Plans for a Comeback

    With the end of its territorial caliphate, the Islamic State will almost certainly attempt a comeback. Such efforts will require money. A new RAND report examines the group as an insurgency and a self-styled caliphate, with a focus on how the group managed its finances. The report recommends that the U.S. government will need to stay involved with counter–Islamic State activities across several lines of effort, including counter-finance and potentially including military action.

  • Setting the Stage for U.S. Leadership in 6G

    Every day there are more headlines about China’s rise in 5G, the next generation of wireless communications technologies, and the economic and national security risks to the United States that go along with these developing technologies. These concerns, particularly the threat of critical infrastructure disruptions, are valid—but the plight of the United States is in part self-inflicted. The U.S. government waited too long to tackle the difficult issues surrounding 5G. As a result, China has unprecedented clout on the global stage regarding the deployment and diffusion of advanced communications technologies. With decisive action today, the U.S. can ensure its status as the undisputed leader in wireless technology within 10 years. In doing so, it will lock in the ability to build secure 6G infrastructure with all the accompanying economic and national security benefits.

  • Data Leviathan: China’s Burgeoning Surveillance State

    Classical totalitarianism, in which the state controls all institutions and most aspects of public life, largely died with the Soviet Union, apart from a few holdouts such as North Korea. The Chinese Communist Party retained a state monopoly in the political realm but allowed a significant private economy to flourish. Yet today, in Xinjiang, a region in China’s northwest, a new totalitarianism is emerging—one built not on state ownership of enterprises or property but on the state’s intrusive collection and analysis of information about the people there. Xinjiang shows us what a surveillance state looks like under a government that brooks no dissent and seeks to preclude the ability to fight back. And it demonstrates the power of personal information as a tool of social control.